Showing 1 to 14 of 14

Prior to initiating a project such as a Business Continuity or Disaster Recovery plan, you should always
have sr. managements support. Programs as important as disaster recovery and business continuity
planning should be supported by sr. management to ens

In any plan, it is important to have strategies to meet objectives in a project. Some examples of
strategies to meet these objectives are as follows:
Define the scope
Plan the work
Manage the work plan or statement of work
Manage the scope
Manage the risk

In any plan, scope is the part of project planning that involves determining and documenting a list of
specific project goals, deliverables, tasks, costs and deadlines. The documentation of a project's scope
explains the boundaries of the project, establi

Defense in depth is the concept of protecting a computer network with a series of defensive mechanisms
such that if one mechanism fails, another will already be in place to thwart an attack. Because there are
so many potential attackers with such a wide v

Vulnerability is the characteristics and situations of a community, system or asset that make it vulnerable
to the damaging effects of a threat. There are many aspects of vulnerability, arising from various
physical, social, economic, and environmental fa

The way to use threats, vulnerabilities, and exploits to convince senior management for the need of a
business continuity plan and a disaster recovery plan is to perform a risk assessment. An IT risk
assessment is a document that reviews the possible thre

The focus of Information Technology is all too often how risk management is going to improve
information security, rather than what is information security going to do for risk management. The only
reason we do information security is to manage the risk o

While the two might be connected in some areas, I believe they are exclusive in nature. Information
security is confidentiality, integrity and availability, testing information and the systems that process or
transmit information from unauthorized disclos

Information security, also known as infosec, is established strategies for managing the processes, tools
and policies necessary to prevent, detect, document and counter threats to digital and non-digital
information. Infosec responsibilities include creat

Cyber warfare is the use of hacking techniques to conduct attacks on a targets strategic or
tactical resources for the purpose of espionage or sabotage. Espionage is basically taking
information that wasnt meant for you. In the case of cyber warfare, it i

Cloud Computing represents more significant shifts in information technology. Reaching the
point where computer functions as utility are great potential. However, customers are more
concerned about the risk of cloud computing if not properly secured and l

TUTORIAL On How To Use Process Explorer
This information was adapted from the help file for the program.
Process Explorer is an advanced process management utility is very similar to Task Manager.
Process Manager picks up where Task Manager leaves off. It